**Thanks to our friends at Wikimedia for making their fundraising data open source.
Results: 1 through 2 of 2 (0.004 secs)|
You searched for: subject:"recon,Security,Conference,search"
|Recon 2005 - Jonathan Westhues - Practical Attacks on a Prox Card|
`Proximity cards' are commonly used as high-tech replacements for magstripe cards or metal keys: you hold the card within a few inches of the reader, and the door clicks open. They are interesting because they are routinely used to control access to property or services. These cards contain electronic circuitry that authenticates them to the reader using a radio link. Many such systems are designed with no security at all...
|Recon 2005 - Fravia - Wizard searching: reversing the commercial web for fun and knowledge|